CN113677569B - Method and device for controlling moving object by using identification device - Google Patents
Method and device for controlling moving object by using identification device Download PDFInfo
- Publication number
- CN113677569B CN113677569B CN201980094510.0A CN201980094510A CN113677569B CN 113677569 B CN113677569 B CN 113677569B CN 201980094510 A CN201980094510 A CN 201980094510A CN 113677569 B CN113677569 B CN 113677569B
- Authority
- CN
- China
- Prior art keywords
- moving object
- identification device
- identification
- mobile object
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 96
- 238000011017 operating method Methods 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 47
- 230000008569 process Effects 0.000 claims description 43
- 230000004044 response Effects 0.000 claims description 13
- 238000005286 illumination Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 9
- 238000009434 installation Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 235000019506 cigar Nutrition 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R11/00—Arrangements for holding or mounting articles, not otherwise provided for
- B60R11/02—Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R16/00—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
- B60R16/02—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
- B60R16/023—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R16/00—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
- B60R16/02—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
- B60R16/03—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for supply of electrical power to vehicle subsystems or for
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/34—Detection related to theft or to other events relevant to anti-theft systems of conditions of vehicle components, e.g. of windows, door locks or gear selectors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/42—Security arrangements using identity modules using virtual identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention can provide a moving object operating method using a marking device. Here, the moving object operation method may include: identifying the identification device by the moving object; identifying and authenticating the user by means of the identified identification means; and providing services to the authenticated user.
Description
Technical Field
The invention relates to a method and a device for controlling a moving object by using a marking device.
Background
Subscriber Identity Modules (SIMs) are used for smart devices and smart phones. In addition, universal Subscriber Identity Module (USIM) technology may be one step advanced over the SIM card in the global system for mobile communications (GSM), which is a form evolved from the SIM card. Here, the USIM may be a microchip, which is an indispensable component for inserting a 3G asynchronous Wideband Code Division Multiple Access (WCDMA) terminal capable of video call. Here, the USIM is composed of a micro Central Processing Unit (CPU) and a memory. The CPU recognizes the user through the encryption and decryption functions, and the memory can be used as a storage space for additional services and has various forms. Such a SIM card is suitable for use with a mobile object, as will be described below.
Disclosure of Invention
First, the technical problem to be solved
The invention can provide a method and equipment for controlling a moving object by using a marking device.
The present invention can provide a method and apparatus for identifying a user of a moving object based on an identification device and providing a service to the identified user.
(II) technical scheme
According to an embodiment of the present invention, there may be provided a moving object operating method using an identification device. Here, the moving object operation method may include: when the mobile object is started, identifying the identification device; performing an authentication process with the network by the identified identification means; and controlling the moving object based on the identification device when authentication is completed based on the authentication process.
According to an embodiment of the present invention, a mobile object to which an identification means is applied may be provided. Here, the moving object may include: a transceiver configured to transmit and receive signals; and a processor configured to control the transceiver. Here, the processor may be configured to: when the mobile object is started, the identification means is identified, an authentication process with the network is performed by the identified identification means, and when authentication is completed based on the authentication process, the mobile object is controlled based on the identification means.
Furthermore, according to one embodiment of the present invention, a system may be provided. Here, the system may include a moving object and an identification device. Here, the system may be configured to identify the identification means when the mobile object is started, perform an authentication process with the network by the identified identification means, and control the mobile object based on the identification means when the authentication is completed based on the authentication process.
Furthermore, the following description may be commonly applied to an application method of the identification device, a moving object, and a system.
According to one embodiment of the present invention, when authentication is completed, a user of a moving object can be detected. Here, when the detected user of the moving object corresponds to the user ID authenticated based on the identification device, the moving object may be controlled.
Here, according to an embodiment of the present invention, the user may be detected based on at least one of authentication key, image recognition, fingerprint recognition, iris recognition, face recognition, and voice recognition.
Furthermore, according to the embodiment of the present invention, when the moving object senses an emergency, the moving object can be controlled regardless of authentication of the identification device.
Further, according to an embodiment of the present invention, the identification means may include moving object setting information corresponding to the user ID, and when authentication is completed based on the identification means, the setting of the moving object may be changed based on the moving object setting information.
Further, according to an embodiment of the present invention, the moving object setting information may include at least one of a position of a driver seat, a height of the driver seat, a color of indoor illumination, a brightness of indoor illumination, a position of an inside mirror, an angle of an inside mirror, a position of a side mirror, an angle of a side mirror, an inside temperature, a steering device angle, a tire pressure, an autopilot setting parameter, a transmission setting mode, an instrument panel mode, a navigation setting, a content setting, and a wireless communication link mode.
Further, according to an embodiment of the present invention, in a state where the identification device is installed, the moving object can identify the identification device.
Furthermore, according to one embodiment of the present invention, when the moving object recognizes the identification device for the first time, the moving object may perform an additional authentication process for the identification device.
Further, according to an embodiment of the present invention, when the mobile object identifies the identification device for the first time, the mobile object may confirm at least one of the ID and the authority information of the identification device and perform an additional authentication process based on the confirmed information.
Further, according to an embodiment of the present invention, when the mobile object identifies the identification device for the first time, the mobile object may further exchange authentication information regarding the identification device with other devices that have completed authentication, and perform an additional authentication process based on the exchanged authentication information.
Further, according to an embodiment of the present invention, the mobile object may store history information about the identification device when the additional authentication process for the identification device is completed.
Further, according to an embodiment of the present invention, when the mobile object again recognizes the identification device corresponding to the history information, the mobile object may perform the authentication process via the network without performing the additional authentication process.
Furthermore, according to one embodiment of the invention, the identification means may be mounted in a mirror of the moving object.
Furthermore, according to an embodiment of the present invention, the identification means is recognized to perform the authentication process irrespective of whether the moving object is started or not.
Here, according to one embodiment of the present invention, when the identification device is identified in a state where the moving object is closed and the authentication process is performed, the identification device may be operated by receiving power from the moving object.
In addition, according to an embodiment of the present invention, when the identification device is recognized in a state where the moving object is closed and the authentication process is performed, the identification device may be operated by being powered by itself.
(III) beneficial effects
According to the present invention, it is possible to control a moving object by using the identification means.
According to the present invention, a mobile object user can be identified based on the identification means, and a service can be provided.
The technical objects of the present invention are not limited to the above technical objects, and other technical objects not mentioned will be clearly understood by those skilled in the art from the following description.
Drawings
Fig. 1 is a view showing a method of a mobile object communicating with other devices.
Fig. 2a-2d are views showing a method of applying the identification means to a moving object.
Fig. 3 is a view showing a method of removing the identification device from the moving object.
Fig. 4 is a view showing a method of applying an embedded type identification apparatus to a moving object.
Fig. 5a-5b are views showing a method of performing authentication of a mobile object based on an identification device.
Fig. 6 is a view showing a method in which a mobile object communicates with other devices and provides services based on an identification means.
Fig. 7 is a flowchart of an operation method of the moving object.
Fig. 8 is a view showing an embedded identification apparatus.
Fig. 9 is a view showing the device configuration of the identification apparatus.
Fig. 10 is a view showing the configuration of the apparatus.
Detailed Description
Embodiments of the present disclosure will be described in detail below with reference to the drawings, and these embodiments will be readily implemented by those skilled in the art. This disclosure may, however, be embodied in many different forms and is not limited to the embodiments described herein.
In the following description of the embodiments of the present disclosure, a detailed description of known functions and configurations will be omitted when it may be judged that the subject matter of the present disclosure is rather unclear. In addition, portions in the drawings, which are not related to the description of the present disclosure, are omitted, and like portions are denoted by like reference numerals.
In this disclosure, when one component is referred to as being "linked," "coupled," or "connected" to another component, it can be understood that it includes not only direct connection, but also indirect connection through intervening components. Furthermore, when an element is referred to as being "comprising" or "having" another element, it can be employed to further comprise the other element without excluding the other element unless the contrary is explicitly stated.
In this disclosure, the terms first, second, etc. are used merely to distinguish one component from another and do not limit the order or importance of the components, etc. unless otherwise specifically indicated. Thus, within the scope of the present disclosure, a first component in one embodiment may be referred to as a second component in another embodiment, and similarly, a second component in one embodiment may be referred to as a first component in other embodiments.
In this disclosure, mutually distinguishing components are intended to clearly illustrate each feature. However, this does not necessarily mean that the components are separate. That is, multiple components may be integrated into one hardware or software unit or a single component may be distributed among multiple hardware or software units. Accordingly, unless otherwise indicated, such integrated or distributed embodiments are also included within the scope of the present disclosure.
In the present disclosure, the components described in the respective embodiments are not necessarily essential components, and some may be optional components. Thus, embodiments consisting of a subset of the components described in one embodiment are also included within the scope of the present disclosure. Moreover, embodiments that include other components in addition to those described in the various embodiments are also included within the scope of the present disclosure.
Advantages and features of the present disclosure and methods of accomplishing the same may be apparent with reference to the following detailed description of embodiments with reference to the accompanying drawings. The invention is not limited to the embodiments set forth herein, however, but may be embodied in many different forms. The present embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Fig. 1 is a view showing a method in which a mobile object communicates with another mobile object or device through a network. Referring to fig. 1, a moving object may communicate with another moving object or another device. Here, as an example, a mobile object may communicate with another mobile object or another device based on cellular communication, WAVE communication, dedicated Short Range Communication (DSRC), or other communication schemes. That is, as the cellular communication network, such as LTE, 5G communication network, wi-Fi communication network, WAVE communication network, or the like may be used. In addition, a local area network used in a moving object, such as DSRC, may be used, and the present disclosure is not limited to the above-described embodiments.
In addition, as an example, regarding communication of a mobile object, a module capable of communicating with only a device inside the mobile object and a module capable of communicating with a device outside the mobile object may exist separately for the safety of the mobile object. As an example, within a moving object, security-based communications, such as Wi-Fi communications, may be conducted only to devices within a certain range of the moving object. As an example, the mobile object and the personal device owned by the mobile object driver may include communication modules only for communicating with each other. That is, the personal devices of the mobile object and the mobile object driver can use a communication network disconnected from an external communication network. Further, as an example, the mobile object may include a communication module for communicating with an external device. Further, the above modules may be implemented as a single module, as an example. In other words, the mobile object may communicate with other devices based on a single module, not limited to the above-described embodiment. That is, in a moving object, communication can be realized based on various methods without being limited to the above-described embodiments.
Here, as an example, a moving object may refer to a device capable of moving. As examples, the mobile object may be a vehicle (including an autonomous vehicle or an autonomous vehicle), an unmanned aerial vehicle, a mobile body, a pallet, a mobile office, a mobile hotel, or a Personal Aircraft (PAV). In addition, the moving object may be any other moving device, not limited to the above-described embodiment.
Fig. 2a-2d are views showing a method of applying the identification means to a moving object.
As an example, the identification means may be a means having a function of identifying at least one of a user, a control target, and a service target. Further, as an example, the identification device may be a device having an ID function. Further, as an example, the identification means may be at least one of a smart device, a smart module, a user identification module and an identification module. That is, the identification means may be a hardware configuration. Further, as an example, the identification means may be a software configuration for the above-mentioned identification. Here, the identification means may be a Subscriber Identity Module (SIM), as an example. As an example, the SIM applied to the moving object as the identification means may be at least one of a mobile SIM (M-SIM) and a vehicle SIM (V-SIM). In addition, the identification means may be, as an example, a module identical to or compatible with an existing SIM, not limited to the above-described embodiment. Although described below based on the identification means, the identification means may be replaced with a smart module, a subscriber module, a SIM, etc., not limited to the above-described embodiments. However, for convenience of explanation, the following description is based on the identification means. As described above, the identification device can be applied to the moving object by considering the case where the moving object communicates with the external device. As an example, a smart phone may identify a smart phone user through a Universal Subscriber Identity Module (USIM) and may provide a service. As an example, when the devices are compatible with the same brand or identification device, the user of the device may be distinguished by changing only the identification device of the user, and services may be provided based thereon. Based on the above, the mobile object may also have an identification device card embedded therein. As an example, as an identification device applied to a moving object, a vehicle SIM may be referred to as a VSIM. That is, as the marking device applied to the moving object, a novel marking device may be applied. As an example, VSIM may be compatible with USIM or another SIM. In addition, the VSIM may provide another service by considering characteristics of the moving object, not limited to the above-described embodiment. In addition, an identification device card applied to a moving object may be provided, and may be referred to by other names, not limited to the above-described embodiment.
Also, as an example, referring to fig. 2a-2d, there may be parts of the application identification means in the moving object. Here, fig. 2a-2d are only examples of application identification means, and the invention is not limited to the above-described embodiments. In particular, as shown in fig. 2a, the portion for applying the identification means may be present at a visually identifiable position at the driver's seat of the moving object. As another example, as shown in fig. 2b, the identification device may be applied in a glove compartment of a passenger seat in a moving object. As another example, the identification device may be inserted into a portion of the moving object where the display exists, not limited to the above-described embodiment.
As another example, as shown in fig. 2c, the identification means may be mounted in a mirror of the moving object. For example, since the mirror in the moving object is easily accessible to passengers without affecting the operation of the moving object or other equipment, the identification means can be installed in the mirror of the moving object. As another example, the identification device may be mounted in a bracket or pad, as shown in fig. 2 d. For example, when a moving object is controlled by a marking device, frequent replacement of the marking device according to a user may often occur. In summary, the marking device may be installed in a bracket or a mat to improve the convenience of installation and thereby control the moving object. Also, as an example, the bracket or pad may be based on a magnetically mounted identification device. In addition, as an example, the identification device may be mounted in the bracket or the pad based on other methods, not limited to the above-described embodiment.
As another example, the identification device may be implemented in a state of being coupled with a tool key or a car key in consideration of portability of the identification device. That is, the identification device may be installed in a tool key or a car key, and the identification device may be removed from the car key and installed in a moving object for use. As an example, the USIM or other identification device having a similar form may have a small size. In addition, the marking device has a portion that contacts the moving object, and it is necessary to prevent the contact portion from being damaged. In view of the above description, the identification device may be combined with a car key or a tool key. As another example, the car key or the tool key itself may be the identification device. That is, each user can hold his own unique car key or tool key as the identification means, thereby controlling the moving object. Meanwhile, as an example, when the car key or the tool key is the identification device, a case where the identification device is installed in the moving object as described in fig. 2a to 2d above may be considered. Further, as an example, a car key or tool key may communicate with a mobile object over a local area network (e.g., bluetooth, beacon, NFC) for message exchange and identification. That is, a car key or a tool key reflecting personal uniqueness may be used as the identification means, not limited to the above-described embodiment.
As another example, the identification device may be installed by an existing device installed in the moving object. For example, existing devices (e.g., high-pass terminals, black boxes) may be installed in a moving object. Here, if a separate mounting part is made in the moving object to mount the identification device, since the equipment of the moving object needs modification and an additionally mounted configuration or assembly may be required, the existing device may be used to mount the identification device. That is, the configuration of installing the identification device can be added to the existing device that has been installed, whereby the identification device can be installed. As another example, the identification device may be identified by an existing terminal (e.g., USB port, cigar socket) included in the mobile object.
As another example, the identification device may be applied to any position within a range within which authentication is possible in the moving object, and the identification device may be applied to a control unit, a communication unit, or a component part of the moving object in an integrated form or in a separated form.
In particular, the moving object may comprise a separate mounting unit for mounting the identification means or a component to which the identification means is mounted. That is, the identification device may be installed in the moving object as a separate component from the other components. As another example, as described above, the identification device may be installed in the moving object in a form of being included in at least one of the control unit, the communication unit, and the other units. As an example, in the moving object, the control unit or the communication unit may be a unit for communicating with an external device or for controlling information. Here, the identification means may provide necessary information to the control unit or the communication unit or operate by identification and authentication. That is, since the identification means may be a means closely related to the control unit or the communication unit, the identification means may be installed in the moving object by combining with these units. That is, the identification device may be installed in the moving object in a form of being integrated with other units. As another example, the identification means may be implemented as identification means embedded in the moving object. The embedded identification means may be physically disposed inside the moving object or implemented in software during the operation and design of the moving object, not limited to the above-described embodiments. This will be described below.
As an example, when changing the apparatus of the moving object or installing an additional configuration to install the identification device, a lot of costs may be required. In view of the above, the identification device may be installed (or recognized) by an existing terminal included in the moving object. Therefore, the marking device can be easily applied to the existing moving object, not limited to the above-described embodiment.
Here, when the identification means is applied to the moving object, the moving object may identify the user based on the identification means. That is, similar to a smart phone, a mobile object may also identify a user of the mobile object based on an identification device. Here, the identification means may include information according to the environment of the user, such as driving record information, navigation setting information, moving object setting information, driver seat information, and steering information of the corresponding user. Here, when the moving object recognizes the identification means, the moving object may change the setting of the moving object based on the information included in the identification means. In addition, as an example, charging for using the moving object may be performed by the identification means. As an example, the mobile object may also perform communication as described above, and charging may be performed by the communication. Further, as an example, charging may be performed based on using a shared moving object or other moving objects. Here, the details of use of the moving object may be confirmed by the identification means based on the use time, the travel distance, and the like, and charging may be performed accordingly. That is, by applying the identification means to the moving object, it is possible to build a system based on information about the use of the moving object. Further, as an example, when the identification device is not applied to the moving object, it may not be operated. As an example, the identification device is only operated when it is applied in a moving object and the moving object recognizes the identification device. However, as an example, it is contemplated that the vehicle may be driven in an emergency or in some circumstances of an emergency.
Meanwhile, as an example, as described above, when the identification device in the moving object is not recognized and authenticated, the control authority for the moving object may not be approved. As an example, if the moving object is a vehicle, the vehicle may be directly controlled when the vehicle is started in the past, however, when the identification device is applied, the vehicle may be controlled only after the vehicle is started and the identification and authentication of the identification device are completed. In particular, the moving object may operate based on fully automatic driving. Further, as an example, a mobile object may communicate with other devices through a communication network and operate based on information received through the communication. However, in the case of a moving object, since various operations and functions for movement purposes may be defined, there may be a security problem and accident risk when identification and authentication cannot be ensured. In view of the above, the mobile object may be started in a manner different from the conventional manner and controlled at the time of identification and authentication based on the identification means.
As another example, the identification means may operate independently of whether the moving object is activated or not. As an example, the means for supplying power to the black box and other existing devices may be included in the moving object. Here, the identification device may be operated by receiving power from the moving object. As another example, the identification means may be a device that is powered and operated by itself. Further, as an example, the identification means may be a device powered and operated based on a separate charger, such as a wireless charger or a solar charger. Here, since the operation of the identification device may not be an operation consuming a large power, the identification device may be operated irrespective of whether the moving object is started. The identification device may be configured to receive power from the moving object and to operate from its own power supply. That is, the identification device may be a device capable of operating irrespective of whether the moving object is started or not, and is not limited to the above-described embodiment. Here, as an example, the identification means may perform the above-described identification and authentication even when the moving object is not activated. Meanwhile, as an example, in order to trigger the identification device when the moving object is not started, identification and authentication may be performed when the personal device of the owner of the moving object is identified. As another example, even when the moving object is not activated, if it is recognized that the driver or other user is seated in the moving object, the operation of recognizing and authenticating the identification means may be performed, not limited to the above-described embodiment. That is, the identification device can operate even when the moving object is not activated, not limited to the above-described embodiment.
Here, as an example, in view of the above, the identification device may be prevented from being arbitrarily removed in the moving object. In particular, in the case of moving objects, as described above, there may be a high risk of safety and accidents. In addition, as described above, in the case of the operation based on the identification device, when the identification device is arbitrarily removed, there may be an accident risk based on authentication errors. In view of the above, the identification device can be prevented from being removed at will. As an example, the identification device may be installed and removed at will before the moving object is started. That is, when the moving object is not operated, the removal of the identification device may not be locked. Thus, a user who wants to use a moving object can change the identification means before activating the moving object, and other identification means suitable for the user can be used.
Here, as an example, when the moving object is started, the arbitrary removal of the identification device may be prohibited. That is, locking of the removal identification means may be performed. Based on the above, it is possible to prevent accidents caused by removing the identification device while the moving object is traveling. Here, as an example, even when the moving object is started, the lock for the removal identifying means may differ depending on whether the moving object is running or not. As an example, when the mobile object is started but not traveling, the identification device can be removed after authentication of the other device. As an example, the further device may be a smart device. In this case, the user may perform authentication for removing the identification device through the smart device and obtain authority to remove the identification device by providing the moving object with the related information. Then, the lock on the removal of the identification device is released, and when the identification device is removed from the moving object, the moving object may be turned off. Next, when another identification device is installed, the moving object may operate based on the other identification device. On the other hand, when the moving object starts and travels, even if authentication is performed on another device, removal of the identification device may not be possible. As an example, when the mobile object is traveling, the mobile object may perform automatic driving or may travel by exchanging information with an external device. Since the random removal of the identification means may occur as an accident, the random removal can be prevented to prevent the accident from occurring.
As a specific example, referring to fig. 3, the removal of the identification device may be performed in the moving object (S310). Here, as an example, the identification device may be removed by the user, or the removal may be performed based on a trigger operation received by the moving object. Here, the triggering operation may be pressing a button or receiving a removal signal from an external device, not limited to the above-described embodiment.
Here, when the identification device is removed from the moving object, it may be determined whether the moving object is activated (S320). When the moving object is started, it may be determined whether the moving object is traveling (S330). Here, when the moving object starts and travels, as described above, the identification device cannot be removed from the moving object in consideration of safety and accident risk (S340). On the other hand, when the moving object is not traveling, additional authentication for removing the identification device may be performed based on the other device (S350). As an example, as described above, the other device may be a smart device. That is, in the case where the moving object is not traveling and further authentication by other means is possible, the identification means may be removed from the moving object (S360). Here, as an example, when the identification device is removed from the moving object, the moving object may be switched to the off state. On the other hand, in the above case, when the moving object is turned off, the identification device may be removed, which is the same as that described above (S360).
As another example, in the case of existing smart devices (e.g., smartphones), the device user and the identification device (e.g., USIM) may generally correspond one-to-one to each other. For example, the identification device need not be replaced except for reasons such as user travel out of home or damage to the smartphone. However, as an example, in the case of a moving object, it is used by a plurality of users in many cases. As an example, in the case of a vehicle, a case where an owner of the vehicle, a family member, or an acquaintance can drive the vehicle may be considered. In view of the above, a plurality of users may be registered or authenticated in one identification device. As an example, a plurality of users (e.g., vehicle owners and families of vehicle owners) may be registered in one identification device. Here, as an example, each user may use a different service and information corresponding thereto. In view of the above, a plurality of users may be registered in the identification device. However, in the above case, even when the moving object is started and the identification device is recognized and authenticated, additional authentication may be performed to identify the user. As an example, authentication of the additional user may be performed based on the mobile object and the device owned by the user. As an example, a device owned by a user may receive a signal for authentication when a moving object is started and the identification and authentication of an identification device are completed. As an example, the signal may be transmitted based on a short-range communication module between the mobile object and the user device. Thus, the signal may be sent only to the user inside the moving object. Here, the user may perform additional authentication in the corresponding device, and may identify a specific user among a plurality of users registered in the identification device to control the moving object.
Meanwhile, as another example, when a moving object is used, the above-described additional authentication of the device owned by the user may be performed by other methods. For example, when the mobile object is started and the identification and authentication of the identification device are completed, the mobile object may obtain additional authentication information. For example, the moving object may include a camera that identifies a user on a driver's seat of the moving object and based on identifying a specific user among the users registered in the identification device. As another example, there may be a fingerprint identification or another authentication key. That is, when the moving object is started and the recognition and authentication of the identification means is completed, each user may be recognized by a fingerprint or after receiving an additional authentication key (e.g., password). Further, as an example, the additional authentication may be through at least one of fingerprint recognition, iris recognition, face recognition, mobile object host input, FOB key, electronic key, internet pre-subscription, another device, server, or mobile device. That is, additional authentication may be required, and the method of additional authentication is not limited to the above-described embodiment. Here, as an example, additional authentication may be performed based on the inherent characteristics of the user. As another example, authentication may be performed based on identification information about an image, voice, or the like of a user, not limited to the above-described embodiment. As a specific example, in the case of a smart device, a user of the smart device may always carry the device. However, in the case of moving objects, it may be used periodically or on an event basis. Here, as an example, there may be a limit to accomplishing the identification and authentication using only the identification means in consideration of the above-described charging and setting information on the use of the moving object. Therefore, as described above, after the identification device completes the identification and authentication and then completes the additional authentication based on the above-described method of detecting a user, the moving object can be operated or controlled. As another example, when the identification device is used by a single user, additional authentication as described above may not be required. That is, in the case of a single user, additional authentication may not be required, and the moving object may be controlled immediately after identification and authentication of the identification device are completed.
As another example, as described above, the moving object may be controlled only when identification and authentication are completed by the identification means. In addition, as an example, the moving object may be controlled only when additional authentication is performed on the user, not limited to the above-described embodiment. However, as an example, as described above, when the operation is based on the identification and authentication performed by the identification device, it may be difficult to cope with an emergency. In view of the above, when the moving object detects or recognizes an emergency, the user can control the moving object irrespective of the identification means. However, as an example, in an emergency situation, as described above, the identification device based setting may not be applied. That is, the control authority of the moving object may be allowed in consideration of a specific situation, but in other cases than an emergency, the moving object can be controlled only by the identification means. Based on the above description, when the moving object has a plurality of users, an operation of the identification device is possible. As an example, based on the above description, a SIM card for a mobile object may be applied to a mobile object. Here, in order to use the mobile object, information of a plurality of users may be registered in the SIM card, and the mobile object may be operated by confirming individual users after identification and authentication based on the identification device, not limited to the above-described embodiment.
Meanwhile, as another example, an additional process may be required when initial authentication is performed between the identification device and the moving object.
Specifically, as described above, the identification means may be identified after the start of the moving object, so that the moving object may be controlled based on the identification means. However, when the identification device is installed in the moving object for the first time, the additional process may be implemented based on whether the identification device has authority to control the moving object and whether initial setting can be made. As an example, when the identification device is first installed in a state where the mobile object is started, the mobile object may determine whether the identification device is first installed. Here, when the identification device is an already installed identification device, the mobile object may perform a setting for identifying the identification device based on history information of the identification device, thereby performing an authentication process. That is, the mobile object can quickly perform authentication on the identification device based on the history information of the identification device.
On the other hand, when the identification device is installed in the moving object for the first time, the moving object may determine whether the identification device has authority to control the moving object. Here, as an example, the mobile object may determine information about a unique ID included in the identification device, so that it may be determined whether the identification device has authority. As another example, a mobile object may be interlocked with an identification device and provide additional authentication information through a device (e.g., a smart phone) that completes authentication. Here, the mobile object may confirm that the identification device has authority from among the completely authenticated devices, thereby performing initial authentication. Meanwhile, when the mobile object successfully passes the initial authentication based on the above description, the mobile object may update the information about the identification device. Here, when the moving object recognizes the identification device again, the moving object can be rapidly authenticated by directly performing the authentication process on the identification device without the above-described additional process. That is, when the identification device is first installed in the mobile object, an additional authority confirmation and setting process may be required, whereby the mobile object can register and operate the identification device.
As another example, even when the moving object is not started, the identification and authentication of the identification device may be performed. As described above, the identification device may operate without activation of the moving object. Here, as an example, the identification means may perform a process of identification and authentication when the mobile object is not activated. As an example, when the identification device is located inside the moving object, the moving object may identify the identification device and perform an identification and authentication process on the identified identification device. Here, as an example, the mobile object may periodically transmit a signal for authenticating the identification device to the inside of the mobile object or transmit a signal for identification and authentication when the identification device is sensed to be detected, not limited to the above-described embodiment. Here, as an example, regardless of whether the mobile object is started, the mobile object may recognize the presence of the identification means, and thus the above-described recognition and authentication process may be performed, not limited to the above-described embodiment.
Further, as an example, referring to fig. 4, an embedded identification device (or Embedded SIM (ESIM)) may be applied to a moving object as an identification device. Here, ESIM may refer to a digital SIM loaded inside a mobile object, not a physical card like a USIM. As an example, the ESIM may be a SIM that encodes authentication information included in the SIM and loads inside the mobile object. Here, as an example, information included in ESIM of a moving object may be modified based on remote or other communication. That is, in the case of a moving object, there may be an owner, and authentication information based on the owner needs to be implemented. In this case, since the owner of the mobile object is information which is not easily changed, user identification information can be implemented by ESIM, and the mobile object can be operated by authentication. Here, as an example, when ESIM is applied to a moving object, authentication may be performed based on an authentication system (or a moving object) in the moving object. As another example, authentication of ESIMs embedded in a mobile object may be performed based on the mobile device. As an example, the mobile device may be a smart device, a host, or the like. That is, authentication of ESIMs embedded in a moving object may be performed based on another mobile device.
As another example, ESIMs embedded in a moving object may be authenticated based on communication with a server. As an example, the smart device may identify the SIM through communication with the base station. Based on a similar approach, the ESIM of the mobile object may be authenticated based on the communication between the ESIM and the server, thereby operating.
As another example, ESIMs embedded in a moving object may be authenticated based on a D2D method or an M2M method. As an example, when an owner or driver of a moving object wants to drive the moving object, the owner or driver may have a moving device. In addition, as an example, a moving device within a moving object may be used. Here, the authentication of the ESIM embedded in the mobile object may be to perform authentication with a mobile device located in a nearby location based on a D2D method. As an example, the above authentication method may be implemented by considering the security of the moving object.
As another example, with respect to fig. 2a-2d and fig. 4 described above, because the ESIM is not physically present as in the case of fig. 4, the ESIM may not be removed or disassembled. However, in the case of the general identification device, the general identification device may be removed from the moving object in consideration of theft or other situations of the moving object. Here, as an example, a system for preventing theft and forced removal of a moving object may be required. As an example, when the identification device is applied in a moving object, if the identification device needs to be removed, additional authentication by another mobile device is required. That is, the identification device may be removed after authentication and identification based on another device that mutually authenticates with the identification device of the mobile object. As another example, the removal of the identification device may be performed by personal authentication. As an example, authentication may be performed based on intrinsic features of a user such as fingerprint recognition, iris recognition, or face recognition, and only authenticated users may be removed. Further, as an example, the removal of the identification device may be performed only when necessary information is authenticated based on Artificial Intelligence (AI). As an example, removal may be performed only by a user authenticated based on identification information of the user, such as an image, a voice, and the like. That is, as in fig. 3 described above, the removal may be performed according to whether the moving object is started or whether the moving object is traveling, and the removal may be performed based on authentication for safety reasons and for preventing accidents, regardless of whether the moving object is started or whether the moving object is traveling. However, the present invention is not limited to the above-described embodiments.
Further, as an example, the identification device may communicate with a neighboring IoT device and be served based on the communication. As an example, the identification device may also be applied in IoT devices. As a more specific example, the identification device may have been applied to a smart phone only until now, but a plurality of identification devices that are compatible with each other and recognize the same user may be applied to a plurality of devices, such as a smart phone, a mobile object, and a home appliance. That is, a user may provide services to a plurality of devices through the identification device of the same user.
Further, as an example, when the mobile object is equipped with an identification device, the mobile object may operate by being combined with an ITS infrastructure. As an example, when autopilot is performed, an identification device in a moving object may be identified, and autopilot service may be provided from a nearby ITS infrastructure through the identified identification device. Here, the user may be authenticated by the identification means, and the service may be provided based on the user information thus authenticated.
Further, as an example, services/security may be provided by the identification means. In addition, a sharing service such as a moving object sharing service may be provided by the identification means.
Further, as an example, control of the ITS infrastructure or traffic system may be performed by an identification means of the moving object. As an example, communication with a server or RSU may be performed by an identification device of a moving object, thereby performing control.
As another example, the traffic infrastructure may be directly controlled based on edge calculations in the moving object. As an example, user authentication may be performed by an identification device of the mobile object, and the IoT or ITS infrastructure may be controlled. As an example, based on the authenticated user, the street lamp may be operated in the vicinity of the moving object that is traveling. That is, since direct control is performed by authentication between the identification device of the moving object and the neighboring infrastructure instead of central control, delay can be prevented and the operation efficiency can be improved.
Further, as an example, as described above, the identification means may comprise information about the user. Here, when the mobile object performs authentication by the identification means, the control of the mobile object may be changed based on the user information included in the identification means, as in the above. As an example, when the mobile object completes authentication by the identification device, the mobile object setting information of the seat, the display, the mobile object control, the navigation service, and the like may be automatically set based on the identification device. That is, the identification device can perform not only authentication but also a control device function for improving the convenience of using the moving object.
Further, as an example, as described above, the identification device may be applied in a moving object sharing system. As an example, a shared moving object may be periodically used by multiple users. In view of the above, it may be inefficient for the operation that each user performs control of sharing the moving object. Thus, the user of the moving object can be identified by the identification means, on the basis of which the moving object can be controlled. That is, a lessee sharing a moving object may install his own identification device in the moving object, and when the moving object recognizes the identification device, the lessee may use the sharing moving object. Meanwhile, as an example, in the case of sharing a service, as described above, personal settings of a seat, a display, and a turn of a moving object, etc., may be changed based on user information included in the identification device, as same as described above. In addition, in the case of sharing a service, charging for use of the mobile object may be performed by the identification means. That is, since the standard at the time of discriminating the use of the moving object according to the user is not clear, each person can be charged by the identification means. As another example, a case where a personal moving object is shared with other users may be considered. Here, as an example, in the above case, the lessee can control the moving object through the lender's identification means. Here, the lender may provide the lessee with control authority over the identification means, and the lessee may control the moving object through the lender's identification means based on the allowed control authority. As an example, the control authority may be a password or authentication of the tenant device. As another example, there may be a lender's identification device and a tenant's identification device, and the moving object may recognize a plurality of identification devices.
As more specific examples, an identification device of a lender lending a mobile object and an identification device of a lessee leasing a mobile object may be used in the mobile object sharing system. As an example, a lender lending a mobile object may generally be the owner of the mobile object. That is, the identification device of the owner of the moving object may be applied to the moving object. Here, when the moving object is normally used or traveling, the moving object may be controlled based on the identification means of the owner of the moving object. Meanwhile, as an example, as described above, when a moving object is used through the sharing system, the moving object may be configured to recognize the tenant identification device and be controlled. Here, as an example, the tenant identification device may be an identification device dedicated to sharing the moving object, and the moving object may be controlled by the tenant identification device. That is, in the mobile object sharing system, a tenant may install a tenant identification device in a mobile object or cause the tenant identification device to be identified, thereby using the mobile object. As described above, since the identification means of the owner (or lender) of the mobile object and the identification means of the lessee exist separately, it is possible to distinguish between the case where the mobile object provides the sharing service and the case where the mobile object is normally used.
Further, as a specific example, the lender identification device may be an embedded identification device (e.g., ESIM) considering being the owner of the mobile object, and implemented in software or hardware in the mobile device. Here, the tenant identification device may be an identification device that can be installed separately. Here, the lender identification device may be identified and authenticated by a password. In addition, as an example, the lender identification device may be identified and authenticated by additional information to enhance security, not limited to the above-described embodiments. Meanwhile, the tenant identification device may be used by being installed in a moving object and identified. That is, when the moving object is normally used, the moving object can recognize the lender identification device based on the password and operate. When the mobile object is shared, the mobile object may operate by recognizing the installed tenant identification device, so that a case of providing the sharing service may be distinguished, but the present invention is not limited to the above-described embodiment.
As another example, when the identification device is applied to a moving object, authentication may be performed based on a server in consideration of security of the moving object. As an example, the server may include security credentials and information required for security. The mobile object can be used only when the authentication of the mobile object is completed through the security authentication of the identification device of the mobile object and the security of the server.
As another example, when the identification device is applied to a moving object, security may be achieved without a server by considering security of the moving object. As an example, a moving object may perform communication with an adjacent moving object or other device based on V2X or V2V communication. Here, each moving object or device may include each hash value based on the blockchain, and based thereon, mutual security may be authenticated through a network structure. That is, the security of the moving object can be ensured through the blockchain.
In addition, fig. 5a and 5b are views showing a method in which a moving object operates based on an identification device. Referring to fig. 5a, a moving object 510 may be activated. Here, the case where the moving object is started may be regarded as the case where the moving object is started. Here, as an example, the moving object 510 may identify the identification device 520. Specifically, as described above, the identification device 520 may be installed in/removed from the moving object 510 or built in as an embedded type. Here, when the moving object 510 is started, the moving object 510 may detect the installation state of the identification device 520, thereby performing mutual recognition. Here, when the mutual recognition between the moving object 510 and the identification device 520 is completed, the identification device 520 may transmit the user information to the network 530.
As another example, referring to fig. 5b, regardless of whether the moving object 510 is activated, the moving object 510 may identify the identification device 520. That is, even when the identification device 520 is turned off, the moving object 510 can recognize the identification device 520. Here, as an example, as described above, the identification device 520 may receive power from the moving object 510 and operate. Alternatively, the identification means 520 may be a device that is itself powered and operated as described above. That is, the identification device 520 may be a device capable of operating irrespective of whether the moving object 510 is activated or not, and is not limited to the above-described embodiment.
Based on the above description, the start condition of the moving object 510 may be a condition of identifying the identification means 520. On the other hand, the activation condition of the moving object 510 may be an unnecessary condition for identifying the identification means 520. Hereinafter, common matters will be described.
Here, the network 530 may transmit authentication information to the identification device 520 based on the received user information. Here, the authentication information may be a key generated based on user information or an authentication key, as an example. Next, the identification device 520 may confirm the authentication information based on the received authentication information and the information stored in the identification device 520, and transmit a response to the network 530, and the network 530 completes the authentication. Next, the mobile object 510 may receive various services provided by the network 530 through the identification device 520. Here, the moving object 510 may be controlled based on the identified user. Based on the above-described procedure, a service to the moving object 510 to which the identification device 520 is attached can be provided.
As an example, the identification means 520 may store information about each user. In particular, services for moving objects may be diverse. As an example, a vehicle is used for driving as a moving object, but each user may not be distinguished. However, more and more services are provided from moving objects to users, and settings or information of individual personalities or personal features may need to be considered. In view of the above, the identification device 520 may store information or settings of a specific user and apply the information or settings to each moving object. As an example, the identification means 520 may comprise information about the user. As an example, the user information may include at least any one of phonebook information, application information, navigation information, charging information, and mobile object setting information. As an example, when the moving object 510 is controlled by the identification device 520, the moving object 510 may perform communication with an external device via the network 530 based on the identification device 520. As an example, like a smart device (e.g., a smart phone), the moving object 510 may exchange data information and voice signals with an external device. That is, the moving object 510 may perform the same function as the existing smart device. Here, as an example, for the above, the identification means 520 may store information about the user. As an example, as described above, it may be stored in the telephone directory information. Here, the user of the moving object 510 may perform communication with an external device through information included in the identification device 520. As another example, in view of the above, charging information may be stored in the identification device 520. As an example, the identification means 520 may include charging information based on data information transmitted and received via the network 530. Here, the network 530 or the server may provide the service for data usage or voice signals to the identification device 520 based on the charging information described above, not limited to the above-described embodiment. That is, when using a moving object, the provided service and the data of use may be managed based on the identification device 520. As another example, the identification device 520 may further include moving object setting information and moving object related information. As an example, in the case where the user uses the moving object 510, the moving object 510 may be differently set and used according to each user to the moving object 510. As an example, the moving object setting information may be automatic driving level information, a vehicle seat, an instrument panel mode setting, a use channel, navigation setting information, a personal device setting, a mirror setting, and the like. In addition, as an example, the moving object setting information may be information on driving characteristics set for various driving environments in a user's personal device, such as a position and height of a driver seat, colors and brightness of interior lights, positions and angles of an interior mirror and a side mirror, an interior temperature control (air conditioner and warm air) range, a steering device (STEERING WHEEL) angle, tire pressure, a transmission setting mode (normal, environment-friendly, power mode, etc.), a wireless communication connection mode (WAVE, cellular, etc.), an automatic driving function setting parameter range (speed and interval, lane change lateral speed, acceleration and deceleration, etc.), and the like. in addition, the moving object setting information may include various other information than the above-described information, not limited to the above-described embodiment. That is, a customized service may be provided to the user using the moving object 510, and user setting information may be included in the identification device 520 so as to control the moving object 510 by considering the user. That is, the service provided through the moving object 510 may be performed based on the identification device 520.
As another example, the identification device 520 performs authentication via the network 530, but may be set not to perform communication with an external communication network. As an example, as described above, the moving object 510 may be identified and authenticated based on the identification device 520, but communication with an external communication network may be restricted in consideration of security and accident risk. Here, the identification device 520 may communicate with other devices existing in the moving object through a short-range communication network. That is, although the moving object 510 is controlled by the identification device 520, the identification device may communicate and exchange data with a specific device within a specific range in consideration of the moving object 510 being a moving object, thereby providing a service.
Further, as an example, a plurality of users may be registered in one identification device. Here, as an example, when operating based on the above, service and data usage may be set for each of a plurality of users. Here, as an example, charging information may also be set and managed for each of a plurality of users. On the other hand, as another example, each service and data use may be individually allowed for a plurality of users in one identification apparatus. However, charging information for service and data usage or data usage information may be collectively managed. That is, when considering providing a service, a service may be provided to each of a plurality of users registered in one identification device. However, the management of the service may be performed as the identification device itself, not limited to the above-described embodiment.
As another example, when a plurality of users are registered in one identification device, common information of a moving object and user-specific information may be distinguished for management. As an example, when a plurality of users are registered in one identification device, public information may be required in consideration of the identification of a moving object. Here, it may not be necessary to distinguish each user for public information, which may be managed by the identification means themselves. As an example, the vehicle state information may not be different per user, but may be common information. On the other hand, navigation settings, vehicle seat settings, and the like may differ from user to user, and thus may be user-specific information. Here, as an example, the identification means may distinguish and use the common information and the user-specific information, respectively, according to the above, but the present invention is not limited to the above-described embodiment.
Meanwhile, in view of the above description, a plurality of identification devices may be installed in a moving object. As an example, the plurality of identification means may be identification means of the same user. That is, the same user can control the moving object based on a plurality of identification devices. Here, as an example, a specific device of the plurality of identification devices may manage services and data provided via a communication network connected to an external device after recognizing a moving object as described above. On the other hand, after the moving object is identified as described above, a specific device among the plurality of identification devices may manage the local area network-based service and data as a specific device inside the moving object. As an example, when data exchange is required in order to talk with other users or provide various services through a mobile object, the mobile object may be provided with services through an identification device capable of connecting to an external network. On the other hand, for the automatic driving mode or vehicle safety related matters, a specific identification device may control services and data recognized only inside the moving object to prevent external exposure. As an example, external access to information acquired or used by the user when using the moving object, such as automatic driving information or driving pattern analysis information of the user, may be prevented. In view of the above description, there may be a plurality of identification means in the moving object, each of which may operate based thereon.
In addition, as a specific example, various services may be provided by an identification device of a moving object. As an example, the operation record of the moving object may be stored by the identification means of the moving object. In addition, the operation record of the moving object may be confirmed according to each person, and may be used by a server or a system.
In particular, the operation information and the related information of the moving object may be stored and shared based on the moving object. Here, when the identification means is applied to the moving object, the user can be identified by the identification means, and the moving object operation information and the related information can be stored and utilized according to each user. As an example, the moving object operation information may include at least any one of destination information, travel distance information, driving pattern information, and driving route information. In addition, the moving object operation information may be information that can be used by a user based on an identification device related to the moving object, not limited to the above-described embodiment. Here, since the user can store and utilize moving object operation information related to himself based on the identification means, the information can be utilized even when the moving object is changed. As an example, based on information stored in the identification device, the user may receive the service through an autopilot or ITS infrastructure. As an example, services related to own driving patterns such as an automatic driving level, information of nearby restaurants, information of a travel route, and the like may be provided. Here, as described above, the corresponding information may be managed by the identification means.
Further, as an example, referring to fig. 6, the moving object 610 may perform communication with other devices via the identification device. As examples, the other devices may be devices of the smart device 620, ioT-based peripheral 630, a communication-capable home appliance 640, or RSU or ITS infrastructure 650, or the like. Here, since the mobile object 610 can be used by identification and authentication by the identification means, the mobile object 610 can perform communication with the above-described communication-capable device by the identification means. As another example, the identification device (e.g., USIM) of the smart device may be a device compatible with the identification device of the mobile object. In addition, as in a moving object, each identification device may be installed in other devices, and based on the devices, communication may be performed and services provided. As another example, one user may have an identification device for each device. That is, each identification device may be installed in the respective devices described above, and each identification device may indicate the same user information. That is, the same user may use the same user ID of the identification device at different devices. Here, as an example, a moving object and other devices may be used in linkage based on the same user information. Here, since a plurality of devices are controlled based on the same user ID and the same user, security can be improved. In addition, each device may transmit information to other devices after storing information required by the user. As an example, each device may periodically update the user's usage history information for the corresponding device based on machine learning. Next, updated usage history information may be exchanged with other devices, and the other devices may be controlled by reflecting the information. That is, the user can control various devices through a plurality of identification devices based on the same ID. Here, charging information may also be provided based on one user ID, so that convenience of the user may be improved.
Fig. 7 is a view showing a method in which a mobile object operates based on an identification device. Referring to fig. 7, when a moving object is started, an identification device may be identified (S710). As an example, when the moving object is a vehicle and starts, the moving object may confirm the identification device through the contact unit and perform recognition of the identification device. Here, when the identification of the moving object and the identification device is completed, an authentication process with the network may be performed through the identified identification device (S720). Next, when the identification device and the network are authenticated based on the authentication process, the moving object may be controlled based on the identification device (S730). As an example, the identification means may include moving object setting information based on the user ID and user information. As an example, the moving object setting may be changed based on the moving object setting information. In addition, based on the user information, information on the operation of the moving object can be processed, not limited to the above-described embodiment.
Fig. 8 is a view showing a method in which a mobile object operates based on an embedded identification apparatus. As an example, as described above, the embedded identification device or identification devices may store profile information as shown in fig. 8. Here, the profile information may be information related to a user or information stored for using a moving object, as an example. Here, as an example, in consideration of the security of the mobile object and the security of the identification device, a configuration capable of accessing the profile and a configuration for authentication with the mobile object may be distinguished. That is, in the embedded identification apparatus, the configuration capable of accessing the profile may obtain information on control of the mobile object from the profile, and may transmit the information to the configuration capable of authentication with the mobile object. In addition, as an example, the operation may be performed based on a configuration different from that shown in fig. 8, and the present invention is not limited to the above-described embodiment.
Fig. 9 is a view showing the identification device. Referring to fig. 9, the identification device 1000 may include a contact unit 1010 that contacts and enables a moving object or other device to be identified. Further, as an example, the identification apparatus 1000 may include a controller 1020 that controls and manages operations based on the identification apparatus 1000. In addition, the identification device 1000 may include an antenna 1030 that performs communication with other devices and exchanges data. Here, as an example, the controller 1020 may manage the contact unit 1010 and the antenna 1030 and may control other configurations. In addition, the above configuration may be a hardware configuration or a software configuration. That is, the above-described configuration may refer to a configuration actually physically included in the identification device 1000 or a software configuration that operates based on the operation and function of the identification device 1000. However, the present invention is not limited to the above-described embodiments.
Fig. 10 is a view showing the configuration of the apparatus. Referring to fig. 10, the apparatus may include at least one of the moving object, the device, the server, and the RSU described above. In other words, the apparatus may communicate with and be linked with other devices, not limited to the above-described embodiments. For example, for the operations described above, device 1100 may include a processor 1110 and a transceiver 1120. That is, the device may include the necessary configuration for communicating with other devices. Further, as an example, the device may include other configurations in addition to the above-described configuration. That is, the apparatus may have an apparatus including the above-described means to communicate with other means, but is not limited thereto, and may be an apparatus that operates based on the above-described contents.
In addition, as an example, the apparatus 1100 may further include a mounting unit 1130 in which other devices (e.g., identification devices) are mounted. Here, the mounting unit may be included in the moving object in the form of fig. 2a to 2d described above. As an example, the mounting unit 1130 may be implemented in any one of areas in front of the driver's seat in the moving object. In addition, as an example, the mounting unit 1130 may be implemented in a passenger seat set in a moving object. In addition, as an example, the mounting unit 1130 may be implemented in a mirror in a moving object. Further, as an example, the mounting unit 1130 may be implemented in a moving object in the form of a stand or paddle wheel, as described above. That is, as described above, the apparatus 1100 may further include the installation unit 1130 for identifying the identification device as the other device, based on which the other device may be identified and authentication may be performed. Here, as an example, the installation unit 1130 may be a configuration to install the above-described device of fig. 9. As another example, the mounting unit 1130 may be implemented inside a moving object as shown in fig. 4. Here, the mounting unit 1130 may be implemented as a physical configuration inside the apparatus 1100. As another example, the installation unit 1130 may be implemented as a software configuration inside the apparatus 1100. Here, when the installation unit 1130 is implemented inside the apparatus 1100, as described above, the identification means may also be implemented as a physical configuration or a software configuration inside the apparatus. The present invention is not limited to the above-described embodiments.
While, for purposes of simplicity of explanation, the exemplary methods of the present disclosure are shown as a series of acts, they are not intended to limit the order in which the steps are performed, and each step may be performed simultaneously or in a different order, as desired. To implement the method according to the present disclosure, the illustrative steps may include additional steps or exclude some steps and include the remaining steps. Alternatively, some steps may be eliminated while additional steps are included.
The various embodiments of the present disclosure are not intended to include all combinations and are intended to illustrate representative aspects of the present disclosure, and features described in the various embodiments may be applied independently or in combinations of two or more.
In addition, various embodiments of the present disclosure may be implemented by hardware, firmware (firmware), software, or a combination thereof. In the case of a hardware implementation, it may be implemented using one or more Application Specific Integrated Circuits (ASICs), digital signal processors (DIGITAL SIGNAL Processors, DSPs), digital signal processing devices (DIGITAL SIGNAL Processing Devices, DSPDs), programmable logic devices (Programmable Logic Devices, PLDs), field programmable gate arrays (Field Programmable GATE ARRAYS, FPGA), general purpose processors (general processor), controllers, microcontrollers, microprocessors, etc.
The scope of the present disclosure includes software or machine-executable instructions (e.g., operating systems, application programs, firmware, programs, etc.) that enable the execution of operations of methods according to various embodiments on a device or computer, as well as non-transitory computer-readable media that store such software or instructions and that may be executed on a device or computer.
Industrial applicability
The invention can be used for controlling a moving object with a presentation device.
Claims (17)
1. A method of operating a mobile object to which an identification device is applied, comprising:
Identifying the identification means in response to the mobile object being actuated;
Performing an authentication process with the network by the identified identification means; and
In response to completion of authentication based on the authentication process, controlling the moving object based on the identification means,
Wherein when the mobile object recognizes the identification means for the first time, the mobile object performs an additional authentication process for the identification means,
Wherein, in response to completion of the additional authentication process for the identification device, the mobile object stores history information of the identification device,
The method of operation further comprises:
identifying the identification device corresponding to the history information; and
The authentication process is performed via the network without performing the additional authentication process.
2. The moving object operation method according to claim 1, further comprising:
in response to the authentication being completed, detecting a user of the moving object,
Wherein the mobile object is controlled in response to the detected user of the mobile object corresponding to the user ID authenticated based on the identification means.
3. The moving object operation method according to claim 2, wherein the user is detected based on an authentication key, image recognition, fingerprint recognition, iris recognition, face recognition, and voice recognition.
4. The moving object operating method according to claim 2, wherein the moving object is controlled irrespective of authentication of the identification device in response to the moving object sensing an emergency.
5. The mobile object operation method according to claim 1, wherein the identification means includes mobile object setting information corresponding to a user ID, and wherein the method further comprises changing a setting of the mobile object based on the mobile object setting information in response to completion of the authentication based on the identification means.
6. The moving object operation method according to claim 5, wherein the moving object setting information includes a position of a driver seat, a height of the driver seat, a color of indoor illumination, a brightness of indoor illumination, a position of an inside mirror, an angle of an inside mirror, a position of a side mirror, an angle of a side mirror, an inside temperature, a steering device angle, a tire pressure, an automatic driving setting parameter, a transmission setting mode, an instrument panel mode, a navigation setting, a content setting, and a wireless communication link mode.
7. The moving object operation method according to claim 1, wherein the identification device is identified in a state where the identification device is installed.
8. The mobile object operation method according to claim 1, wherein when the mobile object recognizes the identification device for the first time, the mobile object verifies ID or authority information of the identification device and performs the additional authentication process based on the verified ID or authority information.
9. The mobile object operation method according to claim 8, wherein when the mobile object identifies the identification device for the first time, the mobile object exchanges authentication information about the identification device with other devices that have completed authentication, and performs the additional authentication process based on the exchanged authentication information.
10. The moving object operating method according to claim 1, wherein the identification device is mounted in a mirror of the moving object.
11. The moving object operation method according to claim 1, wherein the identification means is recognized to perform the authentication process irrespective of whether the moving object is started.
12. The moving object operation method according to claim 11, wherein the identification device operates by receiving power from the moving object when the identification device is identified and the authentication process is performed in a state where the moving object is closed.
13. The moving object operation method according to claim 11, wherein the identification device is operated by being supplied with power by itself when the identification device is identified in a state where the moving object is closed and the authentication process is performed.
14. A mobile object employing an identification device, comprising:
A transceiver that transmits and receives signals; and
The processor may be configured to perform the steps of, the processor is configured to:
The control of the transceiver is performed such that,
When the moving object is started, the identification device is identified,
Performing an authentication procedure with the network by means of the identified identification means, and
Wherein, in response to authentication being completed based on the authentication process, the moving object is controlled based on the identification means,
Wherein when the mobile object recognizes the identification means for the first time, the mobile object performs an additional authentication process for the identification means,
Wherein in response to completion of the additional authentication process for the identification device, the mobile object stores history information of the identification device,
Wherein the moving object identifies an identification device corresponding to the history information; and performing the authentication procedure via the network without performing the additional authentication procedure.
15. The mobile object of claim 14, wherein the processor is configured to detect a user of the mobile object after the authentication is completed, and
And controlling the moving object in response to the detected user of the moving object corresponding to the user ID authenticated based on the identification means.
16. The mobile object according to claim 14, wherein the identification means includes mobile object setting information corresponding to a user ID, and
In response to completion of the authentication based on the identification means, changing the setting of the moving object based on the moving object setting information.
17. A system, comprising:
A moving object; and
An identification device;
Wherein when the mobile object is started, the mobile object recognizes the identification means,
Wherein the identified identification means performs an authentication procedure with the network, and
Wherein when authentication is completed based on the authentication process, the moving object is controlled based on the identification means,
Wherein when the mobile object recognizes the identification means for the first time, the mobile object performs an additional authentication process for the identification means,
Wherein in response to completion of the additional authentication process for the identification device, the mobile object stores history information of the identification device,
Wherein the moving object identifies an identification device corresponding to the history information; and performing the authentication procedure via the network without performing the additional authentication procedure.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020190032593A KR102695209B1 (en) | 2019-03-21 | 2019-03-21 | Method And Apparatus for controlling vehicle using Identity Device |
| KR10-2019-0032593 | 2019-03-21 | ||
| PCT/KR2019/016450 WO2020189877A1 (en) | 2019-03-21 | 2019-11-27 | Moving vehicle control method and device utilizing identification device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113677569A CN113677569A (en) | 2021-11-19 |
| CN113677569B true CN113677569B (en) | 2024-08-16 |
Family
ID=72520305
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201980094510.0A Active CN113677569B (en) | 2019-03-21 | 2019-11-27 | Method and device for controlling moving object by using identification device |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US12081973B2 (en) |
| KR (1) | KR102695209B1 (en) |
| CN (1) | CN113677569B (en) |
| DE (1) | DE112019007059T5 (en) |
| WO (1) | WO2020189877A1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101232640B1 (en) * | 2011-10-05 | 2013-02-13 | 유비벨록스(주) | Method for setting customized vehicle environment |
| US9866665B2 (en) * | 2014-10-31 | 2018-01-09 | Audi Ag | Method for operating a communication system, and communication system |
| US10173642B2 (en) * | 2015-01-23 | 2019-01-08 | Continental Automotive Systems, Inc. | Telematics system with PIN-controlled external SIM to prevent vehicle piracy |
Family Cites Families (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2806228B1 (en) * | 2000-03-07 | 2002-04-19 | Valeo Electronique | MOTOR VEHICLE HAVING AN ANTENNA OPERATED FOR A DEDICATED COMMUNICATION SYSTEM |
| FR2814131B1 (en) * | 2000-09-18 | 2002-12-13 | Valeo Electronique | MOTOR VEHICLE EQUIPPED WITH A "HANDS-FREE" SYSTEM HAVING A RECEIVING ANTENNA POSITIONED AT THE TOP OF THE STEERING COLUMN |
| JP2004130854A (en) * | 2002-10-08 | 2004-04-30 | Fujitsu Ten Ltd | Security device |
| JP2007107377A (en) * | 2002-12-13 | 2007-04-26 | Matsushita Electric Ind Co Ltd | In-vehicle device control system and in-vehicle device control device |
| KR20040054253A (en) * | 2002-12-18 | 2004-06-25 | 주식회사 하이스마텍 | Vehicle Auto Personalizing Method and System using Smartcard |
| JP2004196154A (en) * | 2002-12-19 | 2004-07-15 | Sony Corp | Boarding environment control system, boarding environment control device, boarding environment control method |
| JP4432578B2 (en) * | 2004-01-15 | 2010-03-17 | マツダ株式会社 | Keyless entry device, system and method |
| KR20060099044A (en) * | 2005-03-10 | 2006-09-19 | 삼성에스디에스 주식회사 | Vehicle module control system and method using smart key |
| US8264320B2 (en) * | 2006-09-22 | 2012-09-11 | Automobility Distribution Inc. | Aftermarket keyless starter |
| JP2009287350A (en) * | 2008-05-30 | 2009-12-10 | Toyota Motor Corp | Vehicle control system and portable unit holding device |
| KR20110019489A (en) * | 2009-08-20 | 2011-02-28 | 현대자동차주식회사 | Emergency start method by entering your own number in the button start system |
| US8855600B2 (en) * | 2009-12-21 | 2014-10-07 | Verizon Patent And Licensing Inc. | Method and system for authenticating a non-native user of a mobile device |
| CN201828966U (en) * | 2010-09-03 | 2011-05-11 | 比科(天津)电子有限公司 | Vehicle-mounted unit of electronic toll collection system attached on rearview mirror |
| KR101811022B1 (en) * | 2010-12-15 | 2017-12-20 | 한국전자통신연구원 | Method for authenticating vehicul communication |
| US8560722B2 (en) * | 2011-03-18 | 2013-10-15 | International Business Machines Corporation | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values |
| AU2013291687A1 (en) * | 2012-07-16 | 2015-03-05 | Maxwell Forest Pty Ltd | Authorization of transactions |
| US8890654B2 (en) * | 2013-02-25 | 2014-11-18 | Ford Global Technologies, Llc | Methodology for emergency transfer of keys for vehicle equipped with biometric access and start |
| KR102027917B1 (en) | 2013-08-07 | 2019-10-02 | 현대모비스 주식회사 | Smartkey System using movement pattern recognition of a mobile device and operation method thereof |
| KR20150050838A (en) * | 2013-11-01 | 2015-05-11 | 현대엠엔소프트 주식회사 | A method of operating a vehicle system using usim synchronization of mobile terminal and vehicle information terminal |
| US9305412B2 (en) | 2013-11-22 | 2016-04-05 | Volkswagen Ag | Apparatus, system and method for vehicle authentication management and reporting |
| CN103625423B (en) * | 2013-12-18 | 2016-01-20 | 吉林大学 | A kind of auto security system based on controlling vehicle-carrying communication network technology in real time |
| US9725069B2 (en) * | 2015-10-12 | 2017-08-08 | Ford Global Technologies, Llc | Keyless vehicle systems |
| KR101716218B1 (en) | 2015-11-10 | 2017-03-15 | 현대자동차주식회사 | Vehicle and control method thereof |
| US10112581B2 (en) | 2016-01-29 | 2018-10-30 | Faraday&Future Inc. | Remote control system for a vehicle |
| US9769308B2 (en) * | 2016-02-16 | 2017-09-19 | Livingston Enterprises Llc | Anti-distracted driver system |
| AR109299A1 (en) | 2016-08-08 | 2018-11-14 | Vesuvius Crucible Co | IMPACT PLATE |
| CN107792009A (en) | 2017-10-17 | 2018-03-13 | 小呔科技河北有限公司 | Vehicle starting method and device based on driver identity certification |
| DE102019132134A1 (en) * | 2019-11-27 | 2021-05-27 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | Device for a vehicle for detecting an activation action in a detection area |
-
2019
- 2019-03-21 KR KR1020190032593A patent/KR102695209B1/en active Active
- 2019-11-27 CN CN201980094510.0A patent/CN113677569B/en active Active
- 2019-11-27 WO PCT/KR2019/016450 patent/WO2020189877A1/en not_active Ceased
- 2019-11-27 US US17/438,045 patent/US12081973B2/en active Active
- 2019-11-27 DE DE112019007059.2T patent/DE112019007059T5/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101232640B1 (en) * | 2011-10-05 | 2013-02-13 | 유비벨록스(주) | Method for setting customized vehicle environment |
| US9866665B2 (en) * | 2014-10-31 | 2018-01-09 | Audi Ag | Method for operating a communication system, and communication system |
| US10173642B2 (en) * | 2015-01-23 | 2019-01-08 | Continental Automotive Systems, Inc. | Telematics system with PIN-controlled external SIM to prevent vehicle piracy |
Also Published As
| Publication number | Publication date |
|---|---|
| DE112019007059T5 (en) | 2022-01-05 |
| US12081973B2 (en) | 2024-09-03 |
| CN113677569A (en) | 2021-11-19 |
| WO2020189877A1 (en) | 2020-09-24 |
| KR20200112313A (en) | 2020-10-05 |
| KR102695209B1 (en) | 2024-08-13 |
| US20220141655A1 (en) | 2022-05-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10764256B2 (en) | Smart phone, vehicle control system having smart phone, and control method | |
| CN110877597B (en) | User activated/deactivated short-range wireless communication (SRWC) assisted smart key | |
| CN105376293B (en) | Method and system for remote vehicle access enabled key fob base station | |
| CN111541461B (en) | Moving object, method for controlling moving object and method for separating and identifying device | |
| EP3739925B1 (en) | Method and apparatus for operating moving object based on edge computing | |
| CN103502065B (en) | Method for remote activation of motor vehicle functions | |
| US20210146883A1 (en) | Method and apparatus for controlling moving object using identification device for a plurality of users | |
| CN108933775A (en) | Automated wireless communication authentication | |
| US11308425B2 (en) | Method and apparatus for providing fleet system using identity device | |
| US11540126B2 (en) | Moving object sharing method and apparatus using edge computing in fleet system | |
| KR101992708B1 (en) | Terminal for controlling vehicle, and vehicle control method thereof | |
| CN206983928U (en) | Wireless relay device and wireless relay control system | |
| KR20150137947A (en) | Door Lock System For Vehicle | |
| CN106465452A (en) | Methods, devices and systems for building and operating wireless networks | |
| US11516661B2 (en) | Method and apparatus for controlling moving object using master identity device and slave identity device | |
| CN113677569B (en) | Method and device for controlling moving object by using identification device | |
| KR102662028B1 (en) | Method And Apparatus for attaching and detaching an Identity Device from a mobility | |
| US20150304483A1 (en) | Bluetooth-Based Limitation of Functionality of Motor Vehicle Drivers' Personal Electronic Mobile Smart Devices During Driving | |
| CN113678487B (en) | Method and apparatus for using multiple identification means of a moving object | |
| JP6396732B2 (en) | Wireless communication device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |